Cyber Posture

CVE-2026-39361

HighPublic PoC

Published: 07 April 2026

Published
07 April 2026
Modified
14 April 2026
KEV Added
Patch
CVSS Score 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0004 12.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-39361 is a high-severity SSRF (CWE-918) vulnerability in Openobserve Openobserve. Its CVSS base score is 7.7 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 12.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of URL inputs like enrichment_url to block internal IPv6 addresses, addressing the core parsing bypass flaw in validate_enrichment_url.

prevent

Enforces network boundary protections to isolate internal services such as cloud metadata endpoints from external access, mitigating SSRF exploitation even if application validation fails.

prevent

Mandates enforcement of information flow policies to restrict external authenticated requests from reaching internal network services via URL parameters.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552.005 Cloud Instance Metadata API Credential Access
Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.
Why these techniques?

Vulnerability in public-facing OpenObserve app enables exploitation (T1190); directly facilitates access to cloud metadata services (AWS IMDS, GCP, Azure) to retrieve IAM credentials (T1552.005).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenObserve is a cloud-native observability platform. In 0.70.3 and earlier, the validate_enrichment_url function in src/handler/http/request/enrichment_table/mod.rs fails to block IPv6 addresses because Rust's url crate returns them with surrounding brackets (e.g. "[::1]" not "::1"). An authenticated attacker can reach internal services…

more

blocked from external access. On cloud deployments this enables retrieval of IAM credentials via AWS IMDSv1 (169.254.169.254), GCP metadata, or Azure IMDS. On self-hosted deployments it allows probing internal network services.

Deeper analysisAI

CVE-2026-39361 is a vulnerability in OpenObserve, a cloud-native observability platform, affecting versions 0.70.3 and earlier. The issue resides in the validate_enrichment_url function within src/handler/http/request/enrichment_table/mod.rs, which fails to properly block IPv6 addresses. This occurs because Rust's url crate parses and returns IPv6 addresses with surrounding brackets (e.g., "[::1]" instead of "::1"), bypassing intended restrictions on internal IP access.

An authenticated attacker with low privileges can exploit this flaw over the network with low complexity and no user interaction, achieving high-impact confidentiality violations across a changed scope (CVSS 7.7). The vulnerability allows reaching internal services normally isolated from external access. In cloud deployments, attackers can retrieve IAM credentials via AWS IMDSv1 (169.254.169.254), GCP metadata service, or Azure IMDS. On self-hosted setups, it permits probing of internal network services.

The GitHub security advisory GHSA-gcwf-3p7h-wm79 and commit d1a5d8f65b432e2e82f83231390dec7f107e8d75 address the issue, with the commit providing the fix by correcting IPv6 handling in the validation function. Affected users should upgrade to a patched version beyond 0.70.3 to mitigate the risk.

Details

CWE(s)

Affected Products

openobserve
openobserve
≤ 0.70.3

CVEs Like This One

CVE-2025-54122Shared CWE-918
CVE-2025-50180Shared CWE-918
CVE-2026-7412Shared CWE-918
CVE-2026-30242Shared CWE-918
CVE-2026-2286Shared CWE-918
CVE-2025-27501Shared CWE-918
CVE-2025-57822Shared CWE-918
CVE-2026-27732Shared CWE-918
CVE-2025-36845Shared CWE-918
CVE-2026-0560Shared CWE-918

References